["COINTELPRO was the FBI's secret program to undermine the popular upsurge which swept the country during the 1960s.....The FBI set out to eliminate "radical" political opposition inside the US. When traditional modes of repression (exposure, blatant harassment, and prosecution for political crimes) failed to counter the growing insurgency, and even helped to fuel it, the Bureau took the law into its own hands and secretly used fraud and force to sabotage constitutionally- protected political activity. Its methods ranged far beyond surveillance, and amounted to a domestic version of the covert action for which the CIA has become infamous throughout the world."--Brian Glick. Gang Stalking is modern Cointelpro.]

[2010 Oct] Meet Carol Two Eagle "I'm The Man, here. I have all the power. I control everything. You can't continue doing what you've been doing! It's not allowed! You give the People hope, & that's not allowed by The Program!”

Timelines:
Department Of Army Report On The Use Of Chemical Agent Research, Intelligence Corps Experimentation With Hallucinogenic Drugs.
Summary Of CIA Testing Of Lsd, Chemicals For Altering Human Behavior With A Wide Variety Of Methods.
Summary Of FBI Counter Intelligence Operations As Applied To Stated "Apostles Of Non-Violence," "New Left," "Advocates Of New Lifestyles"

Victims
Leonard Peltier

Books
[1999] WAR AT HOME by Brian Glick

[1999] SECRETS The CIA's War at Home By Angus Mackenzie

[1990] The COINTELPRO Papers: Documents from the FBI's Secret War Against Domestic Dissent by Ward Churchill and Jim Vander Wall.

[1988] Agents of Repression: The FBI's Secret Wars Against the Black Panther Party and the American Indian Movement by Ward Churchill, Jim Vander Wall

FBI Secrets -- An Agent's Expose by M. Wesley Swearingen

A WRIT FOR MARTYRS by Eustace Mullins The FBI’s illegal campaign to forever silence the message of dissident Eustace Mullins

Quotes
The FBI and its allies waged all-out war on AIM and the Native people. From 1973-76, they killed 69 residents of the tiny Pine Ridge reservation, a rate of political murder comparable to the first years of the Pinochet regime in Chile. To justify such a reign of terror and undercut public protest against it, the Bureau launched a complementary program of psychological warfare. [1999] WAR AT HOME by Brian Glick

Within months of taking office, Reagan pardoned W. Mark Felt and Edward S. Miller, the only FBI officials convicted of COINTELPRO crimes. His congressional allies publicly honored these criminals and praised their work. The President continually revived the tired old Red Scare, adding a new "terrorist" bogeyman, while Attorney General Meese campaigned to narrow the scope of the Bill of Rights and limit judicial review of the constitutionality of government action. [1999] WAR AT HOME by Brian Glick

"Black bag jobs" are burglaries performed in order to obtain the written materials, mailing lists, position papers, and internal documents of an organization or an individual. At least 10,000 American homes have been subjected to illegal breaking and entering by the FBI, without judicial warrants. COINTELPRO: The Untold American Story By Paul Wolf

Then on March 8, 1971, a group calling itself the Citizen's Commission to Investigate the FBI, broke into an FBI office in a small town called Media, Pennsylvania. They subjected the FBI to what the FBI has been habitually subjecting political dissidents to throughout the course of its history. That is, in Bureau parlance, a black bag job. The information they obtained was widely distributed through left and peace movement channels, and summarized the following week in the Washington Post.
An analysis of the documents in this FBI office revealed that 1 percent were devoted to organized crime, mostly gambling; 30 percent were "manuals, routine forms, and similar procedural matter"; 40 percent were devoted to political surveillance and the like, including two cases involving right-wing groups, ten concerning immigrants, and over 200 on left or liberal groups. Another 14 percent of the documents concerned draft resistance and "leaving the military without government permission." The remainder - only 15% - concerned bank robberies, murder, rape, and interstate theft. COINTELPRO: The Untold American Story By Paul Wolf

According to FBI memoranda of the 1960s, "Key black activists" were repeatedly arrested "on any excuse" until "they could no longer make bail." The FBI made use of informants, often quite violent and emotionally disturbed individuals, to present false testimony to the courts, to frame COINTELPRO targets for crimes they knew they did not commit. In some cases the charges were quite serious, including murder. COINTELPRO: The Untold American Story By Paul Wolf

Many counterintelligence techniques involve the use of paid informants. Informants become agents provocateurs by raising controversial issues at meetings to take advantage of ideological divisions, by promoting emnity with other groups, or by inciting the group to violent acts, even to the point of providing them with weapons. Over the years, FBI provocateurs have repeatedly urged and initiated violent acts, including forceful disruptions of meetings and demonstrations, attacks on police, bombings, and so on, following an old strategy of Tsarist police director TC Zubatov: "We shall provoke you to acts of terror and then crush you." COINTELPRO: The Untold American Story By Paul Wolf

A concise description of political warfare is given in a passage from a CIA paper entitled "Nerve War Against Individuals," referring to the overthrowing of the government of Guatemala in 1954:
The strength of an enemy consists largely of the individuals who occupy key positions in the enemy organization, as leaders, speakers, writers, organizers, cabinet members, senior government officials, army commanders and staff officers, and so forth. Any effort to defeat the enemy must therefore concentrate to a great extent upon these key enemy individuals.
If such an effort is made by means short of physical violence, we call it "psychological warfare." If it is focussed less upon convincing those individuals by logical reasoning, but primarily upon moving them in the desired direction by means of harassment, by frightening, confusing and misleading them, we speak of a "nerve war".
The COINTELPROs clearly met the above definition of "nerve wars," and, in the case of the American Indian Movement in Pine Ridge, South Dakota, the FBI conducted a full-fledged counterinsurgency war, complete with death squads, disappearances and assassinations, recalling Guatemala in more recent years.
The full story of COINTELPRO may never be told. The Bureau's files were never seized by Congress or the courts or sent to the National Archives. Some have been destroyed. Many counterintelligence operations were never committed to writing as such, or involve open investigations, and ex-operatives are legally prohibited from talking about them. Most operations remain secret until long after the damage has been done COINTELPRO: The Untold American Story By Paul Wolf

The Chicago Special Agent in Charge, Marlin Johnson, who also oversaw the assassinations of Fred Hampton and Mark Clark, makes it quite obvious that he views the murder of Malcolm X as something of a model for "successful" counterintelligence operations. COINTELPRO: The Untold American Story By Paul Wolf

During the 1960's, the FBI's role was not to protect civil rights workers, but rather, through the use of informants, the Bureau actively assisted the Ku Klux Klan in their campaign of racist murder and terror.
Church Committee hearings and internal FBI documents revealed that more than one quarter of all active Klan members during the period were FBI agents or informants. 44 However, Bureau intelligence "assets" were neither neutral observers nor objective investigators, but active participants in beatings, bombings and murders that claimed the lives of some 50 civil rights activists by 1964.
Bureau spies were elected to top leadership posts in at least half of all Klan units. 45 Needless to say, the informants gained positions of organizational trust on the basis of promoting the Klan's fascist agenda. Incitement to violence and participation in terrorist acts would only confirm the infiltrator's loyalty and commitment.
Unlike slick Hollywood popularizations of the period, such as Alan Parker's film, "Mississippi Burning," the FBI was instrumental in building the Ku Klux Klan in the South COINTELPRO: The Untold American Story By Paul Wolf

Virtually every known AIM leader in the United States has been incarcerated in either state or federal prisons since (or even before) the organization's formal emergence in 1968, some repeatedly. After the 1973 siege of Wounded Knee the FBI caused 542 separate charges to be filed against those it identified as "key AIM leaders." This resulted in 15 convictions, all on such petty or contrived offenses as "interfering with a federal officer in the performance of his duty." Russell Means was faced with 37 felony and three misdemeanor charges, none of which held up in court. Organization members often languished in jail for months as the cumulative bail required to free them outstripped resource capabilities of AIM and supporting groups. COINTELPRO: The Untold American Story By Paul Wolf

Most people, when they think of the FBI, have an image from movies like Mississippi Burning and characters like Clarice Sterling from Silence of the Lambs. The media image of the CIA and NSA is much more sinister, but most people think of the FBI purely as a crime fighting organization.
The FBI has been very successful at disrupting and destroying perfectly legitimate organizations involved in dissent - They would like to project the image of crime fighters, but it is not really their principal role.
......What they have been very successful at is disrupting and destroying perfectly legitimate organizations involved in dissent: civil right organizations, women's organizations, generally organizations on the left. So while they would like to project the image of crime fighters, it is not really the principal role of the FBI. [Interview] Jim Vander Wall

In many ways, the stark unwillingness of the federal government to accord Leonard Peltier even a modicum of elementary justice is symbolic of the entire AIM experience during the 1970s and, more broadly posed, of the U.S. relationship to American Indians since the first moment of the republic. The message embedded, not only in Peltier's imprisonment, but in the scores of murders, hundreds of shootings and beatings, endless show trials and all the rest of the systematic terrorization marking the FBI's anti-AIM campaign on Pine Ridge, was that the Bureau could and would make it cost-prohibitive for Indians to seriously challenge the lot assigned them by policy-makers and economic planners in Washington, D.C. The internal colonization of Native America is intended to be absolute and unequivocal.
.......In 1953, just prior to the passage of PL-280, Felix Cohen, one of the foremost scholars of Indian law compared the role of the Indians in America to that of the Jews in modem Germany. He noted that, "Like the miner's canary, the Indian marks the shift from fresh air to poison air in our political atmosphere ... our treatment of Indians, even more than our treatment of other minorities, reflects the rise and fall of our democratic faith." 213 Given that all that happened on and around Pine Ridge occurred long after COINTELPRO allegedly became no more than a "regrettable historical anomaly," 214 Cohen's insight holds particular significance for all Americans. In essence, if we may ascertain that COINTELPRO remained alive and well years after it was supposed to have died, we may assume it lives on today. And that, to be sure, is a danger to the lives and liberties of everyone. [1990] The COINTELPRO Papers: Documents from the FBI's Secret War Against Domestic Dissent by Ward Churchill and Jim Vander Wall.

COINTELPRO was an acronym that the FBI had for its counter intelligence programs. Now normal counter intelligence is something carried out by most intelligence organizations and it basically means looking for spies in your own organization or looking for spies in the populace as a whole. So counter intelligence in its normal parlance would mean activities designed to detect and combat espionage. Within the FBI, it was actually a code word for their programs to infiltrate and disrupt legitimate legal organizations engaged in activities that the government found objectionable. It can range simply from sowing dissent within the organization to, at the other extreme, assassination of the leadership of the organization or the framing of key personnel in the organization on bogus criminal charges and supporting those with fabricated evidence to obtain convictions. [Interview] Jim Vander Wall

Officially, it ended in 1973, but what apparently ended was the use of the term COINTELPRO, because the same sort of activities were conducted against the American Indian movement by the same personnel in the period from 1973 to 1977, for example. [Interview] Jim Vander Wall

So that if you're talking about first oil in Oklahoma, and then low-sulfur coal and uranium in the West, those mineral deposits lay principally on the lands of indigenous people. This led to an outright war on the Pine Ridge Reservation with a group called the Goons, being sponsored by the FBI and the U.S. government and the American Indian movement and local organizations like the Independent Oglala Nation supporting native sovereignty and traditional ways of life.
During the period from 1973 to 1975, at least 60 people were killed by the Goon squads on the Pine Ridge Reservation, and I say at least because these are reported homicides. It is probably much larger than that because the agency to which you would report a homicide was the FBI, who were of course sponsoring the people committing the homicides. So a lot of assaults and murders went unreported. On June 25, 1975, the FBI went on to a property called the Jumping Bull Compound on Pine Ridge supposedly looking for Jimmy Eagle, who was a young Native American man, on charges of having stolen a pair of cowboy boots.
The real reason for them being there was that there was an AIM encampment there and when they encountered people from the encampment, a firefight ensued and the two FBI agents who went in - Ron Williams and Jack Coler were killed in the firefight, as well as AIM member, Joseph Stuntz. Leonard Peltier wound up being framed for those murders and when I say framed, I mean that the FBI coerced witnesses and fabricated evidence in order to obtain a conviction.
.....Peltier has now been down in federal prisons since 1976 on bogus charges and fabricated evidence. [Interview] Jim Vander Wall

One of the other operations the FBI was into was people working for social justice in Central America in the 80s. I was working with a group who was helping mainly Salvadoran and Nicaraguan refugees find jobs in the Bay Area and I remember our offices being broken into with nothing being taken… Later, I found that seemed to be happening across the country with similar groups.
Basically what we had going on was the U.S. supporting a massive terrorist campaign against the people of El Salvador. And I mean terrorism in the very specific narrowly defined sense of the word. We're talking about tens of thousands of political murders, torture and so on. Rather than investigate the supporters of this terrorism in the U.S., the FBI of course investigated those people who opposed this terrorism and then tried to help the victims of it. They did this by infiltrating the organizations, attempting to indict people on immigration charges simply for helping political refugees from terror that was being sponsored by the United States. [Interview] Jim Vander Wall

The FBI and its allies waged all-out war on AIM and the Native people. From 1973-76, they killed 69 residents of the tiny Pine Ridge reservation, a rate of political murder comparable to the first years of the Pinochet regime in Chile. To justify such a reign of terror and undercut public protest against it, the Bureau launched a complementary program of psychological warfare. [1999] WAR AT HOME by Brian Glick

Within months of taking office, Reagan pardoned W. Mark Felt and Edward S. Miller, the only FBI officials convicted of COINTELPRO crimes. His congressional allies publicly honored these criminals and praised their work. The President continually revived the tired old Red Scare, adding a new "terrorist" bogeyman, while Attorney General Meese campaigned to narrow the scope of the Bill of Rights and limit judicial review of the constitutionality of government action. [1999] WAR AT HOME by Brian Glick

Harassment, intimidation and violence: Eviction, job loss, break-ins, vandalism, grand jury subpoenas, false arrests, frame- ups, and physical violence were threatened, instigated or directly employed, in an effort to frighten activists and disrupt their movements. Government agents either concealed their involvement or fabricated a legal pretext. In the case of the Black and Native American movements, these assaults--including outright political assassinations--were so extensive and vicious that they amounted to terrorism on the part of the government. COINTELPRO Revisited - Spying & Disruption By Brian Glick

|----------------------------------------------------|
| TO POLICE OFFICERS: As you can see here, your |
| colleagues are finally telling the truth. Please |
| join them in letting the world know about this |
| decades-old crime. Anonymity is guaranteed if |
| you contact me, Eleanor White, with your story. |
| ewraven1@sympatico.ca |
|----------------------------------------------------|

The first instance where a police officer admitted to
knowing that harassment is happening is from a lady
who uses the code name "anymouse". She and her family
moved into a house which, unknown to them, was a former
methamphetamine lab.

The trace chemicals caused her family to have severely
decayed teeth, to the point where their dentist accused
them of being "meth users."

Someone, probably the dentist (some dentists are required
to report possible drug user symptoms) then turned the
family over to a harassment group who harassed them for
years. Only after finding out about the "meth mouth"
mandatory reporting laws, and informing local law
enforcement that they were NOT meth users (a difficult
task) was she able to get the harassment (almost)
stopped.

No doubt, there are MANY other people who have been
falsely reported by medical personnel as meth users, and
don't have the slightest idea why they are being brutally
harassed. This is an important human rights issue which
needs to be exposed and stopped!

All emails like this one should be approached with a degree
of skepticism, however, I find nothing in the content to
suggest this isn't a bona fide email. I do find
encouragement that if this is a real police officer, we do
have at least some friends in blue:

================================================== =
Dear Eleanor,

I stumbled across your site only a matter of days ago and
I'm afraid to say that the information has confirmed a
number of facts that I had always suspected to be the case.
Throughout recent years we have often ...

[Eleanor talking: Note the word "OFTEN"]

... been called in to cases where a victim suspects that
he/she is being stalked by a large gang, and sometimes has
some form of photographic evidence to back this up. However,
our superiors informed us that they had strict orders (from
where they were unsure) that we were to ignore all cases of
gang stalking and, if possible, to provide evidence that
the victim is criminally insane.

From my investigation in recent days it has become clear that:

- Victims are often people living on their own. This is
because it is a lot easier to marginalize a victim who
has no direct relatives to support them. It is also very
useful for the perpretrators, since the single person
can be classed as mentally ill and there will be
absolutely no evidence to prove that this is not the
case.

- The criminal justice system is strictly under the control
of a small elite who ensure that no charges are pressed
against the instigators of the gang-stalking.

I will continue to look into the matter in the forthcoming
weeks; I get the feeling that perhaps in the Christmas period
we may see a surge in attacks. I will endeavor to keep you
informed as long as I am not silenced.

Thank you for being an upstanding defender of the truth. When
justice is done you will be recognized as a pioneer of their
downfall.

Xxxxx Xxxxxx Xxxxx
================================================

Added on Feb 11/06 (code SN):

Well, today, I received a questionnaire form from a
target in the same geographical area as the officer, and
listen to what she reports about her attempts to get help
from the police:

>I have been personally told by police not involved in
>the situation that people within higher departments
>WILL NOT ALLOW them to assist me.

Added on Feb 11/06 (code CV):

In response to yesterday's report of a second police officer
explicitly stating they had ORDERS to not help a target of
vigilante/group/gang stalking, one of our forum members
reports this THIRD instance below:

"First they assigned the case to a third shift patrol officer -
Officer Xxxxxx - who had no computer background and
was on vacation. When he returned he told me he couldn't
help and he was told to not even enter a record of the
complaint into the police computer BY HIGHER UPS."

Until we had these three reports, the first being in Nov.
2005, our group of targets of vigilante stalking were
largely only able to allege these crimes. These three
reports change the entire complexion of the situation.

Orders from the top makes it very plain this is a major
political agenda, and functionally, it's really not much
different from Hitler's/Stalin's neighbourhood civilian
thugs who keep citizens "toeing the line."

>In the beginning of my [criminal harassment] in 2000, when
>I went to the police station in Xxxxxxx Xxxxxxx XX, the police
>told me that "they were doing this type of thing to someone in
>every apartment building in the city".

Added on Feb 12/06 (code FKA):

>Please don't use my name, but when I went to the FBI in 1996
>and met with the Special Agent in Charge, he immediately said
>"military".
>
>There was no pretending that this wasn't going on (and going
>on a lot). He referred our case to the Portland FBI who
>ordered an investigation. Of course that investigation would
>be sent to Sacramento where the FBI there refused to investigate.
>
>Every other law enforcement agency were made to stop
>investigating. None of the agents pretended there was "nothing
>going on." They just looked beaten down and said "I'm sorry".

Added on Feb 13/06 (code _S):

>2004, small mid-western town, victim remote shocked while
>driving her car on main street.
>
>On reporting incident to police, officer admitted that remote
>shocking can and does happen but refused to make a report and
>referred victim BACK TO HER HOMETOWN POLICE.

Eleanor White commenting: "BACK TO HER HOMETOWN POLICE?"
Does this suggest that local police are initiating targeting
of some people they "can't get justice" for via the courts?

Added on Feb 14/06 (code ZR):

>Eleanor, I went to the sheriff's office in the county in
>Xxxxx where I believe the gangstalk "higher ups" reside.
>I called and e-mailed a detective in criminal intelligence
>who was working with another target who resided in that
>county (next to mine). I also mailed this detective a
>copy of David Lawson's report ("Terrorist Stalking in
>America") and Norma's [gangstalking] CD. He emailed me back
>and said that the volume of information that I and this
>other target were sending him was too much.
>
>I then called him -- he said to go to MY local police--I
>asked him if he was aware of where the gangstalking was
>originating from (in his county) he replied "yes." I
>hope he is aware of and working on this now in that
>county. These people are also heavily into selling drugs
>and claim to be professional murderers.

Added on Feb 16/06:

This is a quote from private investigator David Lawson's
2001 book titled "Terrorist Stalking in America", a review
of which can be read here:

"I also spoke with police officers from across the country.
They confirmed the existence of stalking groups across the
country. In general, they said that "cause stalking" is
primarily a civil problem where the plaintiff has to prove
financial loss. They also said that there are free speech
and grass roots issues involved. In fact, the police
themselves are targets of these groups. In small towns, the
number of members in these groups can easily exceed the
number of police officers. In general, the police will NOT
talk about stalking groups. One officer did say there is
a storm brewing as groups become larger and more numerous."

Added on March 29/06 (code CJ):

>Was thinking this a.m. about an incident which happened about
>10-8 years back in Key West An interim police chief with the
>first name of John resigned his position due to threats on
>himself and his family. When pressed for details by reporters,
>he stated :"You wouldn't believe it"...I do know that a further
>investigation was taken on his behalf by Top Cops around the
>country, who then could not figure out how the "threats" were
>delivered, although some were made on his phone. I think he
>"heard" the threats to himself and family and the Perps seemed
>to have highly personal information about him and family.

** TO TARGETS: Keep this case in mind, as it suggests that
interim police chief was a target of citizen gang stalking and
electronic harassment. Mention it and the others here if you
find yourself discussing citizen gang stalking with a police
officer.

Added on May 12/06 (code DJ):

We have a report that two police officers in an Ontario,
Canada city have affirmed to a target that they know organized
stalking is happening. An investigation was started, stopped,
and then restarted and is in progress as of May 12/06.

The officers are quoted as saying to the target that they do
want a conviction, and that while working on "criminal
harassment" cases - their term for organized stalking - is
quite difficult, the police report success in dispersing some
organized stalker by their presence.

Added on July 25/06 (code DJ):

This is a follow up to the above entry dated May 12/06.

In spite of the really hopeful admission that organized
stalking was known to police, and that they wanted to help
and obtain convictions, this case got assigned to a detective
who flat refuses to "believe" (the word "admit" is more
applicable) that organized stalking exists.

Furthermore, apparently, this same police department asked
the local paper to NOT PUBLISH STORIES ABOUT ORGANIZED
STALKING! This is an OUTRAGEOUS abrogation of freedom of
speech and the seniour officer responsible should not be
allowed to continue in police service!

Added on November 16, 2007 (code CS):

From a former police officer writing about her ex-husband:

"I asked my ex husband who is a very honest law enforcement
officer and has been for 37 years. He believed me but said
to keep researching and filing reports with my local
county... Well now 1 year later he admits he knows of the
group and they are stronger then any police organization
and they basically leave them alone and do not even talk
about them."

Added on November 16, 2007 (code DJ):

A target who had been having intense on the highway
harassment from perpetrator vehicles called the highway
patrol agency and complained. The target complained about
"cause stalking", which is the term for organized stalking
used by private investigator David Lawson in his book by
that name.

The target asked the highway patrol officer if the officer
knew about "cause stalking." The officer replied, "OH, YES!"

The officer offered to investigate, but the officer could
only go so far, because of a dead end investigating a licence
plate. The officer stated emphatically that the officer
knew that organized [cause] stalking was a real crime. The
target was able to loan a copy of Lawson's book to the officer.

Added on November 16, 2007 (code EM):

A target who discused organized stalking with a prominent
lawyer got the reply "OH, YES!" to the question of whether
organized stalking exists.
New Info : Many law enforcement,city,county and state are involved in masonic stalking
Fire fighters, judges,city,county and state road and utility workers,and many more masons that are intwined into our cities,counties,state and ofcourse,federal...Bullying in the schools are masonic orchastrated.. led by masonic parents ..

Mind control and psychological warfare are the primary weapons that led to our current Monarch Moment. Cults like Scientology/Freemasons and mind control-manufactured Monarch girlies and Operation Mockingbird are the fungus among us that has been eating away at the foundations of democracy for decades....

. To end these crimes I recommend authorities detain NSA director General and Army intelligence director General . More evidence is free online in books and films titled MONARCH: The New Phoenix Program. The perpetrators will block the websites, use fake websites, or use a strategy called shoot the messenger, a smear campaign, one PR disaster after another to change the subject away from their crimes. Please, ignore the smoke screen and focus on the facts and just the facts.

True victims of gangstalking are not programmed....They twist it..
We are the sane ones.. They have there breathen mind controlled
thur there
Illuminati that tricked down to the porch masons, there flunkies.
If they hear voices and alll the other electroinc barrage, Its their drones..

There may be victims hearing voices, voices moving cigs and all the other , BUT its them., not us, They may be rejects...from there programming and really hear this.. BUT, let me make it clear to all, TRUE victims of gangstalking DO NOT HEAR voices, nor all the other .

Testing "through my eyes" vision.
Back to top
This test requires that you NOT speak any words out loud, but only write them down or type them on a typewriter. You can use a computer but if the perps are using tempest, they can read every word on your computer screen. You can communicate with a friend by writing on a piece of paper the destination and activity the two of you agree upon. If the perps are there ahead of you, they probably can see through your eyes or read your thoughts.

This is a typical reply from the freemasons online that we have to deal with..
This is to discredit real victims...And to try to apply /instill there warped thinking into US.
ONCE MORE, THIS IS NOT A TRUE VICTIM, JUST A LOW LIFE FREEMASON HARASSING TRUE VICTIMS

if you email me, i'll explain in detail....Ron
P.S. I'm a victim as well !!

You are not a victim. You are simply someone who, like thousands of others, are watching me, the LONE and SOLE electronic harassment victim who's transmission just happens to be "in the clear" (I.e. not encrypted/scrambled by the people who are responsible for my implants), and using my experience to help craft your story of being a "so-called" victim.

But that's okay. You people can do what you want. I really don't know intentions of you posers (Good or bad), nor do I care at this point. I will be exposing everything from the political cult that's running this whole "fishbowl" operation, to showcasing the photos and videos of the "human scientists" responsible for this sick behavioral experiment, that somehow managed to convince everyone that this is some legitimate role playing game that people can get involved in just for the sake of one person.

The more humane and ethical thing to do would have been to just tell me personally: "Hay man. Look at this. you're streaming audio and video on the net through your eyes and ears!" Then I would've gotten it taken care of much sooner. Instead, I'm exploited like a two dollar pro, passed around from country to country, with everyone commenting and planning their day around what I happen to be "thinking about, or researching online. case in point, your post above. I believe anyone who willing participates in this travesty is a broken soul who needs to fix whatever went wrong in their won lives, and leave mine alone. I'm already being irratiated by strong RF energy due to these audio and video implants in my head 24/7. My risk of getting cancer and tumors skyrockets. Imagine going through this since 1981, and here it is 2010. My growth and appearance has been drastically altered during my childhood because of the constant bombardment of this RF radiation at my head, which affects brain development and growth (pituitary gland).

Some now imagine me not only being tortured with the radiation, but now being psychologically assaulted by total strangers (like you) mocking my situation by posting fake victim stories based off of MY (not your) experience. And Compound that with the ongoing humiliation of having certain people devoid of a soul take the raw video and audio feeds to mash up into a movie depicting me as a [fill in the blank]. People purposely put me in certain situation to advance a certain storyline, and all the video from both their camera phones and my eyeballs are edited together to weave a movie, which is show in the clear on the Internet.

Compound that with people who view this movie, and don't know me personally, now see me as the "script writers" what me portrayed (in a negative light). So when they do come in contact with me, they're ready to call the cops based on a work of fiction.

That's a lot of stress to carry, and it pains me to see the ugly side of human nature with you and other mocking my situation like it's a joke. I normally wouldn't want people to go through what I'm going through, but in this case, I'm going to outright say that I hope and pray that this really does happen to the people who are mocking me by playing the fake victim role. One you and others get a taste of what it's really like, you would no longer be quick to sit back and watch someone slowly die for your enjoyment, or participating to get a fast buck off his/her demise. This is not something to play with nor joke about.

Most people in my situation would have killed themselves (or others) long ago.

Notice I'm still here. That's because my will for exposing the truth is far greater than my will to give up on life, although I'm sure that's what you and your fellow "Acting" friends" would like (to see me die). But if it's a snuff film you want to see, you will have to do it the old fashion way.

How NSA access was built into WindowsTP: How NSA access was built into Windows
Duncan Campbell
Telepolis
Careless mistake reveals subversion of Windows by NSA.
A CARELESS mistake by Microsoft programmers has revealed that special access codes prepared by the US National Security Agency have been secretly built into Windows. The NSA access system is built into every version of the Windows operating system now in use, except early releases of Windows 95 (and its predecessors). The discovery comes close on the heels of the revelations earlier this year that another US software giant, Lotus, had built an NSA "help information" trapdoor into its Notes system, and that security functions on other software systems had been deliberately crippled.
The first discovery of the new NSA access system was made two years ago by British researcher Dr Nicko van Someren. But it was only a few weeks ago when a second researcher rediscovered the access system. With it, he found the evidence linking it to NSA.
Computer security specialists have been aware for two years that unusual features are contained inside a standard Windows software "driver" used for security and encryption functions. The driver, called ADVAPI.DLL, enables and controls a range of security functions. If you use Windows, you will find it in the C:\Windows\system directory of your computer.
ADVAPI.DLL works closely with Microsoft Internet Explorer, but will only run crypographic functions that the US governments allows Microsoft to export. That information is bad enough news, from a European point of view. Now, it turns out that ADVAPI will run special programmes inserted and controlled by NSA. As yet, no-one knows what these programmes are, or what they do.
Dr Nicko van Someren reported at last year's Crypto 98 conference that he had disassembled the ADVADPI driver. He found it contained two different keys. One was used by Microsoft to control the cryptographic functions enabled in Windows, in compliance with US export regulations. But the reason for building in a second key, or who owned it, remained a mystery.
A second key
Two weeks ago, a US security company came up with conclusive evidence that the second key belongs to NSA. Like Dr van Someren, Andrew Fernandez, chief scientist with Cryptonym of Morrisville, North Carolina, had been probing the presence and significance of the two keys. Then he checked the latest Service Pack release for Windows NT4,
Service Pack 5. He found that Microsoft's developers had failed to remove or "strip" the debugging symbols used to test this software before they released it. Inside the code were the labels for the two keys. One was called "KEY". The other was called "NSAKEY".
Fernandes reported his re-discovery of the two CAPI keys, and their secret meaning, to "Advances in Cryptology, Crypto'99" conference held in Santa Barbara. According to those present at the conference, Windows developers attending the conference did not deny that the "NSA" key was built into their software. But they refused to talk about what the key did, or why it had been put there without users' knowledge.
A third key?!
But according to two witnesses attending the conference, even Microsoft's top crypto programmers were astonished to learn that the version of ADVAPI.DLL shipping with Windows 2000 contains not two, but three keys. Brian LaMachia, head of CAPI development at Microsoft was "stunned" to learn of these discoveries, by outsiders. The latest discovery by Dr van Someren is based on advanced search methods which test and report on the "entropy" of programming code.
Within the Microsoft organisation, access to Windows source code is said to be highly compartmentalized, making it easy for modifications to be inserted without the knowledge of even the respective product managers.
Researchers are divided about whether the NSA key could be intended to let US government users of Windows run classified cryptosystems on their machines or whether it is intended to open up anyone's and everyone's Windows computer to intelligence gathering techniques deployed by NSA's burgeoning corps of "information warriors".
According to Fernandez of Cryptonym, the result of having the secret key inside your Windows operating system "is that it is tremendously easier for the NSA to load unauthorized security services on all copies of Microsoft Windows, and once these security services are loaded, they can effectively compromise your entire operating system". The NSA key is contained inside all versions of Windows from Windows 95 OSR2 onwards.
"For non-American IT managers relying on Windows NT to operate highly secure data centres, this find is worrying", he added. "The US government is currently making it as difficult as possible for "strong" crypto to be used outside of the US. That they have also installed a cryptographic back-door in the world's most abundant operating system should send a strong message to foreign IT managers".
"How is an IT manager to feel when they learn that in every copy of Windows sold, Microsoft has a 'back door' for NSA - making it orders of magnitude easier for the US government to access your computer?" he asked.
Can the loophole be turned round against the snoopers?
Dr van Someren feels that the primary purpose of the NSA key inside Windows may be for legitimate US government use. But he says that there cannot be a legitimate explanation for the third key in Windows 2000 CAPI. "It looks more fishy", he said.
Fernandez believes that NSA's built-in loophole can be turned round against the snoopers. The NSA key inside CAPI can be replaced by your own key, and used to sign cryptographic security modules from overseas or unauthorised third parties, unapproved by Microsoft or the NSA. This is exactly what the US government has been trying to prevent. A demonstration "how to do it" program that replaces the NSA key can be found on Cryptonym's website.
According to one leading US cryptographer, the IT world should be thankful that the subversion of Windows by NSA has come to light before the arrival of CPUs that handles encrypted instruction sets. These would make the type of discoveries made this month impossible. "Had the next-generation CPU's with encrypted instruction sets already been deployed, we would have never found out about NSAKEY."

Excerpts from the Ritual for the Degree of the Elect of Nine (9th degree of Freemasonry)THE VERY SOVEREIGN: You must remember, my Brother, that, when you were accepted to be Free Mason, when you were given the Light, you saw all your Brothers with their Swords. They serve to defend you and to save you from danger. But at the same time it was their destiny to touch you, to punish you and to stab you in your chest to revenge the Freemasonry if you deceive and violate yourself to the pledged Vows that you have made...The Brother Inspector: I am willing to practice revenge against all traitors of the Freemasonry.THE VERY SOVEREIGN: I must announce to you that the man may be someone that you know. Possibly even a friend of yours, with whom you may have very strong ties. In that case you must suppress all your fellow-feelings, to only keep the feelings of revenge. Thus, this is a very good chance to show your courage and to prove your diligence, and this is the only possibility to access your desired Degree. ...The Brother Inspector: I,--- , promise solemnly, in presence of the Great Architect of the Universe and the Honorable Brothers of the Gathering of the Chosen Ones of the Ninth to never reveal the Secrets of this Degree to whom ever which are mine, thus will still be trusted, unless I know him and know that he is of the same Degree as I. I promise to revenge the Freemasonry, as well as in general as in special cases. I join additionally to be as a support pillar for the Order, to help my Brothers with all my heart and all power, to obey the Grand Council of the Princes of Jerusalem...THE VERY SOVEREIGN:... The first Symbol is made by doing as if one is stabbing the forehead of another with a Dagger; he must answer by feeling his head with his hand as if he wants to see if he is blood-stained.The Second Symbol is made by doing as if one is planting the Dagger in the heart of the Brother; beside that one says 'Nekam'. The other brings his right-hand up to the heart and says 'Nikar'.(In the "Historic Construction" presented as the basis for this ritual the overzealous Brother, in loyalty to the Brotherhood in revenging the enemy, stabs him in the head and chest, thus denying the King his plan to carry out the most cruel torture against the offender. The Brother was to himself be punished for denying the King this pleasure, but All Brothers threw themselves onto the ground to beg his mercy and forgiveness and he was spared.)Near the close of the ceremony the lines read,...how easy the heart of a good King can be touched, and, how important it is to have true friends that can warmly defend you under all circumstance.

Now let me get this straight....the breathen HAS to revenge, lets look again...to only keep the feelings of revenge. Thus, this is a very good chance to show your courage and to prove your diligence, and this is the only possibility to access your desired Degree. ...They are saying unless you revenge, you can not enter the degree.
What they do is create "traitors" such as victims of gangstalking.. OR they can not enter...plain as day !!!!

One of the most perplexing aspects of multiple stalker harassment is the ease with which it can be disguised so as to appear no crime has been committed. It is extremely difficult to explain this to people who have never been targetted by a stalking group. Here below are two very convincing examples provided by multi stalking target Deborah S. which we can all use when we are forced to justify our claims. Thank you, Deborah! In multiple-party harassment, the offending actions of any one individual can became more and more subtle and difficult to name as specific incidents. Every one specific action is part of a coordinated whole.
The African-American high school student who goes to a racist all-white school might experience it this way: four students position themselves at points in the student's classroom route, each one uttering a syllable. One says, FUH, second says KING, next one says NI, next one says GRRR. Put together, these syllables say something very hurtful and destructive to that student.
In multiple-party harassment, the four may switch syllables, or they may have 40 white students taking turns each day saying these syllables over a two-week period. There is little that a principal or other investigator can do to discipline these students unless he is able to break the conspiracy, which may not happen. What is more likely is that it is the targeted student who will experience being disciplined - it is the targeted student who will lose control at some point, and unfortunately, that is the point that disciplinary action can be taken.
Let's say after three months of FU-KING-NI-GRRR he can't take it any longer and shoves the second guy. The principal asks him, "What is it that he said that upset you so?" The student tells him. The principal says, "Wait - You're telling me you shoved him because he called you King???" The student tells him "No, no, there is more to it than that." The principal tells the student he has anger issues, is imagining things, and the student, who has endured three months of multiple-party racial slurs with no recourse, is then given detention or other disciplinary action on top of it for not being able to handle his anger.
So the injustice here is that a victim of racial hatred then becomes a victim of the inability to understand why this multi-party harassment was able to make him lose control.
Here is another example. Imagine a female college student who has been raped by a really popular male student. The male student wore a purple shirt on the night of their "date." When the victim files charges, a lot of students express their support for the popular male by wearing purple shirts. They position themselves wherever she goes, by wearing the purple shirt. As a victim of a psychological trauma, the symbolism is not lost on her, and each time a purple-shirted student blocks her way or sits in front of her or follow her into the restroom she is reminded of her humiliation and violation. If it continues, she will either drop out or psychologically collapse. This is the power that the symbol has over her.